<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.3.3) -->
<?rfc compact="yes"?>
<?rfc subcompact="no"?>
<?rfc rfcprocack="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ccc-v6ops-address-accountability-00" category="info" consensus="true" submissionType="IETF" tocDepth="3" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.2 -->
  <front>
    <title>IPv6 Address Accountability Considerations</title>
    <seriesInfo name="Internet-Draft" value="draft-ccc-v6ops-address-accountability-00"/>
    <author initials="T." surname="Chown" fullname="Tim Chown">
      <organization>Jisc</organization>
      <address>
        <email>Tim.Chown@jisc.ac.uk</email>
      </address>
    </author>
    <author initials="C." surname="Cummings" fullname="Chris Cummings">
      <organization>Energy Sciences Network</organization>
      <address>
        <email>chris@cummings.tech</email>
      </address>
    </author>
    <author initials="D." surname="Carder" fullname="Dale W. Carder">
      <organization>ESnet</organization>
      <address>
        <email>dwcarder@es.net</email>
      </address>
    </author>
    <date year="2024" month="October" day="21"/>
    <area>Operations</area>
    <workgroup>IPv6 Operations</workgroup>
    <keyword>IPv6</keyword>
    <abstract>
      <?line 67?>

<t>Hosts in IPv4 networks typically acquire addresses by use of DHCP,
   and retain that address and only that address while the DHCP lease
   remains valid.  In IPv6 networks, hosts may use DHCPv6, but may
   instead autoconfigure their own global address(es), and potentially use
   many privacy addresses over time.  This behaviour places an
   additional burden on network operators who require address
   accountability for their users and devices. There has been some
   discussion of this issue on various mail lists; this text attempts to
   capture the issues to encourage further discussion.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://timchown.github.io/address-accountability/draft-chown-v6ops-address-accountability.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ccc-v6ops-address-accountability/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        IPv6 Operations Working Group mailing list (<eref target="mailto:v6ops@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/v6ops/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/v6ops/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/timchown/address-accountability"/>.</t>
    </note>
  </front>
  <middle>
    <?line 79?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Administrators of IPv4 networks are used to an address accountability
model where devices acquire a single IPv4 address using DHCP <xref target="RFC2131"/>
and then use that address while the DHCP lease is valid.</t>
      <t>The IPv4 address may be a global address, or a private address <xref target="RFC1918"/>
used in conjunction with Network Address Translation (NAT) <xref target="RFC2663"/>.
The address obtained by DHCP is typically tied to a specific device
MAC address.</t>
      <t>This model allows an administrator to track back an IP address to a user or
device, in the event of some incident or fault requiring investigation.</t>
      <t>While by no means foolproof, this model, which may include use of DHCP
option 82, is one that IPv4 network administrators are generally
comfortable with.</t>
      <t>In IPv6 networks, where hosts may use SLAAC <xref target="RFC4862"/> and Privacy
Addresses <xref target="RFC8191"/>, it is quite possible that a host may use
multiple IPv6 addresses over time, possibly changing addresses used
frequently, or using multiple addresses concurrently.  Where privacy
addresses are used, a host may choose to generate and start using a
new privacy address at any time, and will also typically generate a
new privacy address after rebooting.  Clients may use different IPv6
addresses per application, while servers may have multiple addresses
configured, one per service offered.</t>
      <t>There are many reasons why address stability is desirable, e.g.,  DNS
mappings, ACLs using IP addresses, and logging.  However, such
stability may not typically exist in IPv6 client networks,
particularly where clients are not managed by the network provider, e.g.,
in campus 'Bring Your Own Device' (BYOD) deployments.</t>
      <t>It is also worth noting that in an IPv4 network, it is more difficult
for a user to pick and use an address manually without clashing with
an existing device on the network, while in IPv6 networks picking an
unused address is simple to do without an address clash.</t>
    </section>
    <section anchor="address-accountability-approaches">
      <name>Address accountability approaches</name>
      <t>The issue of address accountability for IPv6 networks, and thus also
for dual-stack IPv4-IPv6 networks, is one that has been raised many
times in various discussion fora. This document attempts to capture
the various solutions proposed, noting the advantages and disadvantages
of each approach.</t>
      <t>At this stage of the draft's evolution, no single approach is recommended.
The best solution may vary depending on the scenario and tools available.</t>
      <t>The existing approaches to address accountability fall into the
following categories.</t>
      <section anchor="switch-router-polling">
        <name>Switch-router polling</name>
        <t>By polling network switch and router devices for IPv4 Address Resolution
Protocol (ARP) tables and IPv6 Neighbour Discovery (ND) tables, and
   correlating the results with switch port MAC
   tables, it should be possible to determine which IP addresses are in
   use at any specific point in time and which addresses are being used
   on which switch ports (and thus users or devices).</t>
        <t>This is the approach that has been adopted by tools such as
   NAV (https://nav.uninett.no) and Netdot (https://nav.uninett.no), and
   that will be found in many other (open source) tools.  It is sometimes
   referred to as "ND cache scraping".</t>
        <t>Such scraping is mentioned in <xref target="RFC9099"/>, Section 2.6.1.4,
   where approaches to gather
   the data include SNMP (specifically <xref target="RFC4293"/>),
   streaming telemetry (where the collector
   subscribes to updates/notifications from the device) and using a
   command line interface (CLI, such as ssh).</t>
        <t>The downside of this approach is the load that may be placed on
   devices by frequent Simple Network Management Protocol (SNMP)
   or other polling. The polling frequency
   needs to be rapid enough to ensure that cached ND/ARP data on devices
   is not expired between polling intervals, i.e., the ND/ARP data should
   not be expired more frequently than the device is polled. RFC 9099
   suggests this period may be as low as 30 seconds.</t>
      </section>
      <section anchor="record-all-nd-traffic">
        <name>Record all ND traffic</name>
        <t>If all ND traffic observed on a link can be captured, it should be
   possible for IPv6 address usage to be recorded.  This would require
   appropriate capability on a device on any given subnet, e.g. as is
   currently achieved for RAmond (https://ramond.sourceforge.net)
   or NDPmon (https://sourceforge.net/projects/ndpmon), or a reporting
   mechanism for the subnet router, such as syslog.</t>
        <t>There may also be mechanisms such as a (filtered)
   Remote Switch Port Analyser (RSPAN) that may be suitable.</t>
        <t>A benefit of this approach is that collecting all ND traffic would
   allow additional accounting and fault detection to be undertaken,
   e.g. rogue RA detection, or DAD DoS detection.</t>
        <t>The downside may be the significant volume of traffic to be held,
if a lengthy history is desired.</t>
      </section>
      <section anchor="force-use-of-dhcpv6-only">
        <name>Force use of DHCPv6 only</name>
        <t>One approach to accountability is to attempt to force devices to only
   use DHCPv6, rather than SLAAC, which would in principle give the same address
   accountability model as exists with DHCP for IPv4 today.
   <xref target="RFC4649"/> for DHCPv6 appears to give at least some of the functionality
   of DHCP option 82.</t>
        <t>While it is possible to craft IPv6 Router Advertisements that give
   hints to hosts that DHCPv6 should be used, i.e., the'M' bit is set, there is
   no obligation on the host to honour that hint.  However, if the
   Autonomous (A) flag in the Prefix Information option is unset (as
   discussed in section 5.5.3 of RFC 4862), the Prefix Information
   option should be ignored.  In such cases a user running the device will need to
   determine the on-link prefix if they wish to manually configure their
   own address.</t>
        <t>Not all common operating systems support DHCPv6 for host addressing,
Android being the most notable exception. Larger enterprises that are
enforcing use of DHCPv6 appear to be ones running dual-stack, so in those
scenarios clients that do not support DHCPv6 will be IPv4-only.</t>
      </section>
      <section anchor="using-8021x">
        <name>Using 802.1X</name>
        <t>It is now quite common practice for research and education sites -
university or college campuses and research organisations - to use 802.1X
for network authentication as part of the international
eduroam <xref target="RFC7593"/> (https://www.eduroam.org) federated authentication system, as
deployed at thousands of educational sites across over 70 countries.
Use of 802.1X gives the network operator knowledge about their own users
authenticating, but would require coordination with remote peers for
details of visiting users admitted via eduroam.</t>
        <t>802.1X can also be used for wired network access control.</t>
      </section>
      <section anchor="use-a-host-based-registration-protocol">
        <name>Use a host-based registration protocol</name>
        <t>A current I-D, <xref target="I-D.ietf-dhc-addr-notification"/>, presents a
mechanism for hosts to opt in to registering
their self-generated or statically-configured addresses to a DHCPv6
server.</t>
        <t>While it's an opt-in mechanism, it may be enough in some use cases, e.g.,
when the enterprise controls the devices that can connect to the network.</t>
        <t>There is a consideration for address lifetimes when using this approach.</t>
      </section>
      <section anchor="using-a-prefix-per-host">
        <name>Using a prefix per host</name>
        <t>By using a prefix per host, the accountability model shifts from
identifying address(es) used by a host, to the prefix from which it
is using addresses, whether for itself (e.g., for containers) or
for providing tethering.</t>
        <t><xref target="RFC8273"/> and <xref target="RFC9663"/> describe approaches for devices being assigned
a prefix rather than an address (potentially of many addresses) for
their network connectivity. The use of a single prefix per device may
simplify accountability.</t>
      </section>
      <section anchor="use-savi-mechanisms">
        <name>Use SAVI mechanisms</name>
        <t>The FCFS SAVI: First-Come, First-Served Source Address Validation
Improvement for Locally Assigned IPv6 Addresses approach could be used
as defined in <xref target="RFC6620"/>.</t>
        <t>In this case the accounting</t>
        <t>Discussion of appropriateness of SAVI mechanisms to be added here.
   (In principle, SAVI mechanisms work by observing NDP and DHCP
   messages, allowing bindings to be set up and recorded.)</t>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>This draft discusses mechanisms for a site or organisation to manage
   address accountability where IPv6 has been deployed.  In most
   networks there is a requirement to be able to identify which users
   have been using which addresses or devices at a given point in time.
   This draft was written in response to requests for improved
   accountability for IPv6 traffic in university campus sites, but
   the same rationale is likely to apply elsewhere.</t>
      <t>While the sources of data that may be used for such purposes (e.g.,
   state on routers or switches) is generally not available to general
   users of the network, it is available to administrators of the
   network.</t>
      <t>The use of privacy mechanisms, e.g.,  RFC 8191, gives the
   greatest benefit when the addresses are being observed by external
   third parties.</t>
      <t>The introduction of randomised MAC addresses for devices is designed
   to be privacy-enhancing for users, whether used only in the probing
   messages when seeking to join a network, or for associating to a
   network to use it. Such randomisation may have an impact on address
   accountability models.</t>
    </section>
    <section anchor="conclusions">
      <name>Conclusions</name>
      <t>This text is an initial draft attempting to capture the issues
   related to IPv6 address accountability models.  If an all-DHCPv6
   model is not viable, IPv6 network administrators will need to deploy
   management and monitoring tools to allow them to account for hosts
   that will have multiple IPv6 addresses that may also change rapidly
   over time.</t>
      <t>Some of the approaches described do not depend on a specific type of
   address management being used, and will thus work with other
   addressing methods if they emerge in the future.</t>
      <t>Feedback on the issues discussed here is welcomed.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>There are no extra security consideration for this document.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The author would like to thank the following people for comments on and
suggestions for this text:
Lorenzo Colitti, Mark Smith, and James Woodyatt.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC1918">
          <front>
            <title>Address Allocation for Private Internets</title>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <author fullname="B. Moskowitz" initials="B." surname="Moskowitz"/>
            <author fullname="D. Karrenberg" initials="D." surname="Karrenberg"/>
            <author fullname="G. J. de Groot" initials="G. J." surname="de Groot"/>
            <author fullname="E. Lear" initials="E." surname="Lear"/>
            <date month="February" year="1996"/>
            <abstract>
              <t>This document describes address allocation for private internets. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="5"/>
          <seriesInfo name="RFC" value="1918"/>
          <seriesInfo name="DOI" value="10.17487/RFC1918"/>
        </reference>
        <reference anchor="RFC2131">
          <front>
            <title>Dynamic Host Configuration Protocol</title>
            <author fullname="R. Droms" initials="R." surname="Droms"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>The Dynamic Host Configuration Protocol (DHCP) provides a framework for passing configuration information to hosts on a TCPIP network. DHCP is based on the Bootstrap Protocol (BOOTP), adding the capability of automatic allocation of reusable network addresses and additional configuration options. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2131"/>
          <seriesInfo name="DOI" value="10.17487/RFC2131"/>
        </reference>
        <reference anchor="RFC4293">
          <front>
            <title>Management Information Base for the Internet Protocol (IP)</title>
            <author fullname="S. Routhier" initials="S." role="editor" surname="Routhier"/>
            <date month="April" year="2006"/>
            <abstract>
              <t>This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in the Internet community. In particular, it describes managed objects used for implementations of the Internet Protocol (IP) in an IP version independent manner. This memo obsoletes RFCs 2011, 2465, and 2466. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4293"/>
          <seriesInfo name="DOI" value="10.17487/RFC4293"/>
        </reference>
        <reference anchor="RFC4649">
          <front>
            <title>Dynamic Host Configuration Protocol for IPv6 (DHCPv6) Relay Agent Remote-ID Option</title>
            <author fullname="B. Volz" initials="B." surname="Volz"/>
            <date month="August" year="2006"/>
            <abstract>
              <t>This memo defines a new Relay Agent Remote-ID option for the Dynamic Host Configuration Protocol for IPv6 (DHCPv6). This option is the DHCPv6 equivalent for the Dynamic Host Configuration Protocol for IPv4 (DHCPv4) Relay Agent Option's Remote-ID suboption as specified in RFC 3046. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4649"/>
          <seriesInfo name="DOI" value="10.17487/RFC4649"/>
        </reference>
        <reference anchor="RFC4862">
          <front>
            <title>IPv6 Stateless Address Autoconfiguration</title>
            <author fullname="S. Thomson" initials="S." surname="Thomson"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <author fullname="T. Jinmei" initials="T." surname="Jinmei"/>
            <date month="September" year="2007"/>
            <abstract>
              <t>This document specifies the steps a host takes in deciding how to autoconfigure its interfaces in IP version 6. The autoconfiguration process includes generating a link-local address, generating global addresses via stateless address autoconfiguration, and the Duplicate Address Detection procedure to verify the uniqueness of the addresses on a link. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4862"/>
          <seriesInfo name="DOI" value="10.17487/RFC4862"/>
        </reference>
        <reference anchor="RFC6620">
          <front>
            <title>FCFS SAVI: First-Come, First-Served Source Address Validation Improvement for Locally Assigned IPv6 Addresses</title>
            <author fullname="E. Nordmark" initials="E." surname="Nordmark"/>
            <author fullname="M. Bagnulo" initials="M." surname="Bagnulo"/>
            <author fullname="E. Levy-Abegnoli" initials="E." surname="Levy-Abegnoli"/>
            <date month="May" year="2012"/>
            <abstract>
              <t>This memo describes First-Come, First-Served Source Address Validation Improvement (FCFS SAVI), a mechanism that provides source address validation for IPv6 networks using the FCFS principle. The proposed mechanism is intended to complement ingress filtering techniques to help detect and prevent source address spoofing. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6620"/>
          <seriesInfo name="DOI" value="10.17487/RFC6620"/>
        </reference>
        <reference anchor="RFC8191">
          <front>
            <title>Home Network Prefix Renumbering in Proxy Mobile IPv6 (PMIPv6)</title>
            <author fullname="Z. Yan" initials="Z." surname="Yan"/>
            <author fullname="J. Lee" initials="J." surname="Lee"/>
            <author fullname="X. Lee" initials="X." surname="Lee"/>
            <date month="August" year="2017"/>
            <abstract>
              <t>In the basic Proxy Mobile IPv6 (PMIPv6) specification, a Mobile Node (MN) is assigned with a Home Network Prefix (HNP) during its initial attachment, and the MN configures its Home Address (HoA) with the HNP. During the movement of the MN, the HNP remains unchanged to keep ongoing communications associated with the HoA. However, the current PMIPv6 specification does not specify related operations when HNP renumbering has occurred (e.g., due to change of service provider or site topology, etc.). In this document, a solution to support HNP renumbering is proposed, as an optional extension of the PMIPv6 specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8191"/>
          <seriesInfo name="DOI" value="10.17487/RFC8191"/>
        </reference>
        <reference anchor="RFC9099">
          <front>
            <title>Operational Security Considerations for IPv6 Networks</title>
            <author fullname="É. Vyncke" surname="É. Vyncke"/>
            <author fullname="K. Chittimaneni" initials="K." surname="Chittimaneni"/>
            <author fullname="M. Kaeo" initials="M." surname="Kaeo"/>
            <author fullname="E. Rey" initials="E." surname="Rey"/>
            <date month="August" year="2021"/>
            <abstract>
              <t>Knowledge and experience on how to operate IPv4 networks securely is available, whether the operator is an Internet Service Provider (ISP) or an enterprise internal network. However, IPv6 presents some new security challenges. RFC 4942 describes security issues in the protocol, but network managers also need a more practical, operations-minded document to enumerate advantages and/or disadvantages of certain choices.</t>
              <t>This document analyzes the operational security issues associated with several types of networks and proposes technical and procedural mitigation techniques. This document is only applicable to managed networks, such as enterprise networks, service provider networks, or managed residential networks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9099"/>
          <seriesInfo name="DOI" value="10.17487/RFC9099"/>
        </reference>
        <reference anchor="I-D.ietf-dhc-addr-notification">
          <front>
            <title>Registering Self-generated IPv6 Addresses using DHCPv6</title>
            <author fullname="Warren &quot;Ace&quot; Kumari" initials="W. A." surname="Kumari">
              <organization>Google, LLC</organization>
            </author>
            <author fullname="Suresh Krishnan" initials="S." surname="Krishnan">
              <organization>Cisco Systems, Inc.</organization>
            </author>
            <author fullname="Rajiv Asati" initials="R." surname="Asati">
              <organization>Independent</organization>
            </author>
            <author fullname="Lorenzo Colitti" initials="L." surname="Colitti">
              <organization>Google, LLC</organization>
            </author>
            <author fullname="Jen Linkova" initials="J." surname="Linkova">
              <organization>Google, LLC</organization>
            </author>
            <author fullname="Sheng Jiang" initials="S." surname="Jiang">
              <organization>Beijing University of Posts and Telecommunications</organization>
            </author>
            <date day="16" month="May" year="2024"/>
            <abstract>
              <t>   This document defines a method to inform a DHCPv6 server that a
   device has one or more self-generated or statically configured
   addresses.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-dhc-addr-notification-13"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC2663">
          <front>
            <title>IP Network Address Translator (NAT) Terminology and Considerations</title>
            <author fullname="P. Srisuresh" initials="P." surname="Srisuresh"/>
            <author fullname="M. Holdrege" initials="M." surname="Holdrege"/>
            <date month="August" year="1999"/>
            <abstract>
              <t>This document attempts to describe the operation of NAT devices and the associated considerations in general, and to define the terminology used to identify various flavors of NAT. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2663"/>
          <seriesInfo name="DOI" value="10.17487/RFC2663"/>
        </reference>
        <reference anchor="RFC7593">
          <front>
            <title>The eduroam Architecture for Network Roaming</title>
            <author fullname="K. Wierenga" initials="K." surname="Wierenga"/>
            <author fullname="S. Winter" initials="S." surname="Winter"/>
            <author fullname="T. Wolniewicz" initials="T." surname="Wolniewicz"/>
            <date month="September" year="2015"/>
            <abstract>
              <t>This document describes the architecture of the eduroam service for federated (wireless) network access in academia. The combination of IEEE 802.1X, the Extensible Authentication Protocol (EAP), and RADIUS that is used in eduroam provides a secure, scalable, and deployable service for roaming network access. The successful deployment of eduroam over the last decade in the educational sector may serve as an example for other sectors, hence this document. In particular, the initial architectural choices and selection of standards are described, along with the changes that were prompted by operational experience.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7593"/>
          <seriesInfo name="DOI" value="10.17487/RFC7593"/>
        </reference>
        <reference anchor="RFC8273">
          <front>
            <title>Unique IPv6 Prefix per Host</title>
            <author fullname="J. Brzozowski" initials="J." surname="Brzozowski"/>
            <author fullname="G. Van de Velde" initials="G." surname="Van de Velde"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>This document outlines an approach utilizing existing IPv6 protocols to allow hosts to be assigned a unique IPv6 prefix (instead of a unique IPv6 address from a shared IPv6 prefix). Benefits of using a unique IPv6 prefix over a unique service-provider IPv6 address include improved host isolation and enhanced subscriber management on shared network segments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8273"/>
          <seriesInfo name="DOI" value="10.17487/RFC8273"/>
        </reference>
        <reference anchor="RFC9663">
          <front>
            <title>Using DHCPv6 Prefix Delegation (DHCPv6-PD) to Allocate Unique IPv6 Prefixes per Client in Large Broadcast Networks</title>
            <author fullname="L. Colitti" initials="L." surname="Colitti"/>
            <author fullname="J. Linkova" initials="J." role="editor" surname="Linkova"/>
            <author fullname="X. Ma" initials="X." role="editor" surname="Ma"/>
            <date month="October" year="2024"/>
            <abstract>
              <t>This document discusses an IPv6 deployment scenario when individual nodes connected to large broadcast networks (such as enterprise networks or public Wi-Fi networks) are allocated unique prefixes via DHCPv6 Prefix Delegation (DHCPv6-PD), as specified in RFC 8415.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9663"/>
          <seriesInfo name="DOI" value="10.17487/RFC9663"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA4VaXXPbRrJ9x6+YUh4sVZGUv6LYunWrwkjrjbZsRSV5k93H
ITAgJwIw2BmANG9K//2e7p4BQFr2pioWCQ5m+rtPd898Ps+2l+pNVri80bW5
VIXXZTfP83y+vXBtmOui8Cbgb567vun0yla2289fvsxCv6ptCNY13b7Fmzd/
+/xBqR+UroK7VCe2KUxr8E/TnczUiSls57zVFX25Wf6CP87j0/3nDydZ09cr
4y+zQnfmMstdE0wT+nCpOt+bLMfTtfP7S2Wb0mXaG439f2uN1x1ODyfZzvnH
tXd9i+c3d9sLNf0x25qmx7ZKfXOJUsLCyR/YyDZr9XdaSc9rbSs8Z1n8bE1X
Lpxf0w/a5xv8sOm6Nlyen9M6emS3ZpGWndOD85V3u2DOeYdzenNtu02/wrud
rfON2zXnz8uY1lZgPXSXKh2TXlnIJgvrvvHyedQjLf6uJhebrq6yrLUkoM7l
l+rF3oQX8gUa7MDlizf0Pexrb8owLgjOd4dPcle3Ou8mS/rV+Kxx9MiXeetd
rvPHtCzrbFeRAZFalkKlWh5Qqa6gJ1skjUUbGFX4fQt43MnmWab7buM8sUr/
zeNfBcMCF58X6orkNTwVj/hs66Pn0O2l+ocN+fDEiJ1g6YKX/vwnfl3ofNE/
Pn/WFc7q6xq2Fo6Ou9p4G77+kc/8W2P8eq8ecmua3AR1azpi/JiMnLb4OY9b
LDqTb56n4hpUaA+xHtFwrSuj/vjqR6HhoTHd8YnFLuelP5uwoJ+zxvka4t+y
391/uHr1/tW7+PH1qzev4se3r9+/SR8v3r5PH99dvI4fLy5ev4wf32GL+PH9
y/e89mZ+zc42LzY5m/e8cZ0tbc6Kv8woXByS8friIh3404/D2e9e/5Q+vucF
2Xw+V3oVOg/LzYjZX13oAoRGdvRWNSL3QGEDp1XVXun8P731RkUvg3JWe9UH
o1yprn+9upvRLroplDedxj7dRndpMT93DXY5eLrbWKih2xjeQFVGB0O7eBJ6
E9RWV7ZYQAyNuE6iaqY2TG2thQJ6e3sxU6u+o2eZaL8zulDwB4dwW9p17/ko
6xXMV60rt9JVouTUhLMZE9m6DvHcMse9UFPrZq9ab7c630+4d1vjFcKVAYGf
N7DoldnorXW9V22lyXg1OxTesKQtnLbqYUINBJE4UY6d2HmShQPfByLmtw+j
BNQdmQBxXuRamK3FcQtQYfDyRhMpOCa4mukv4Kk9pzFSVUekIqv1hujYag+K
A2cBVVkI9X9kRWe+QE9dZ+oWgu4cbZTrtotSlB3oBwVHBc96bVTZe/zkJwcu
xNBqWxSVybIfoMnOu6LPSSBZtizgv5aMkEUA6g6ND0GQ+CzoGN2MxnQgk6x2
hakgP2I+ymI0VhUQIWBkvHHaoKeHYnN//RUd9ukpI2GCgYZt6r8aKkQQDTTL
IPnDE8gyV3T8oZ0xJNBiTN2gZyGCAgiIYH7hPjDaP/uGBaV2yIUpFA7547PX
Tag4EKjT2+Xns8gL/PvpacEkpf3dijwS+8JjmQE7dezORgmr0JqcoksUY/Zp
eZX2YCbxmggb7yHni04mKqRdKKI8qhX9o8ltByL4BLJayCCTA2aK44RRBgim
I/2TzeJhbgt+4FWp+6qLjkFKs80WeMGumW8Q9QdrBnw1TtUGEoGLuAr515Uz
sWSmeEYqzDesF2xf9YWZxq7MtSzHd69nJBvXRP1PzfGQVTHOtUG+IiEC0tXw
TdgkqCF1gbSvo5bY6GHsevi4hJRZdZQWnp7Yp+8k3GTLIdzwCkoRT0+gsSMy
IRMYUevgaqsqWSxvn3bPakjPtmL/F88Fr1l6f4+kqps1yXhcRsaYlSR9qKPa
s/mK8wwbj4thsXnvPa9ETPyDmY1xMxuXJaeeTWkFjHPkdC6KlJwDYgid9l08
UWeN2R3HYUUsN/vICr2ys1XFCH1i4eOez+9RdpCGNyuH5NqsQftVBfwxUVJh
y9IQZ4KyRmYQvpVu2ypm5FmMFLDyLYVneh9JwTwjrmzISpAEGRxtRe/BL2CW
dFyMLBTG8D+nIaDCAMSHY0byw5AdYBOFCdaTFc6UWawXM6Wubx+yGjQSUpqp
5dXHFP9G3zRBZFe59VoE8KvbwSf9DPgW0Go8gRgCBJnI1nyBS0TccKFyFtxo
8lkLBdq8R+mAtWL/eRQuMUV7gTFkDw5OFAuSu8GHtwSIIyMZxURdt0hWL37h
UPBvSrW/IZdfczB5oU5/+fdv12cQQVu5fU1nkBeyq7BBYFvE0YaVLN6CPfUh
4km+VTsvaifiu6zkuM3RCzYK3h9ZYGQbk8QETnoWCkUABzCSVzps6DR6gPwi
0qIHEgApBU94TuZjjyIHH8g+0GR9wxkiHQlSg63JskBX4YaTJ1QxEZAE0u/y
2QxKFuydzjewSs4bER6U38i4jEKOQpvkzl4kzeIqIIo5LAeiIgHPj16YhtkB
snhtiTky9YxcmgFpwigTHIP99UJQF+r6nnQ9BSsJqWQk2/R6cFXP5RJZFoIe
+d1gC+SYWw0O1yaCKhvGJxlEYSCfQVCQ5rKT9BJohQArI72FFwH5LB5GRyQI
kl4m1r1BwqipeVBIql4hqw0kspuB7r2SDgPRGC0l5KYhhkTgSHUgd0ulOVw+
ApHBxka1cvL9hi5hsJAyZe6NgeIos9PLsSdhDTnRDz+oB1hWvpmjAqVg2WId
VmXZL/v0eXDcwCulFJDVCZVFu3k72OG9SSxnd94RUq/U6fL+7kxxJhVVsOHc
GrverMjjr2EGlL72QD3XaSEbIGNUhwxEqCiqFcfAf4NAqEhZiziggG1ofXod
Xh/gOFVBsG1MqfApAw6Q+E1EENOoySHMMsrnSCC5aEBRrYNcGeLAlCU58RaH
768M0cqZlirQJi6a0BrU6eBeAvvdINMzcmwVKxCCdZuJoR06ly6AcmKcZcOh
2K40lxm3y9/VaerBNHq76Buw3HWLxp0x5UCfBWL1t9YM8ucjOQdDjiUMjcEs
5y7HxcEpSh6qTXqfmzMhhCo8DrqE/tjtpQhEDvQRmgZ1cnsNm8zZBbymbHay
YM4fiIv0jEM3FXCuERjNsInKaYJND0bw9OvFxeLV4i1XrJKTDl0F6HIjXQF2
at3pATQ+3H66U6dJxRzsBbuh0H96OuMtARGNrtkCTWXAEtmqnEP7wcgrEOL4
gNCvQLtdycF9Sw3CcD6t8uE23tVCCev8LKYeAUVs83XN6ZusFCZnfIn6U51e
fbyZJSWrEDZni2gq2Ak1MLWbhopwGpzoqMrpQpQZSxmuaamI55IyOjRMKaFD
9SBpKJUpnzirc2QeXZukd8Zm7qM5xODBxesQSeKeOVfyjTEFCwdEkJILVJyu
X2+k9gxSkIJONg4Y6vU5AogoDaqOlHJLIDDcMF9aS2a1AqHkFulQFhwKOgoG
C7OYsRimu0l8YJKwzcoMOzFWGFEykdNM9EUH0yEI9dSAUWSNovo1cgslLFIA
4J91xVA4BmhgR3/evAQqBFYsYhy+xxdfUAUG4qjaIojCer0pj56i7mMgSloD
egGXj5BSQ/vHBFkcBj7aZYh9Q5Ifq2bKdFERTAVxJJFnxzvE/gX3LcieALQJ
deOwlG2YkBH7UFhY2y0FhH6FWCJYj9i2rLKhnkDW2lhDrBBZ98saAhmDkdf0
fSFBBQvWhnp0ydBur+9qqpHT6qNl5yD0T/gjvK5osfAsFuneUOylJEc9IEPV
kQ116sBEgmOGm7jZPgBFD47GuH0v8BNiG7YZgi8OOi1t1RHcZ4LvTe0gM0m3
6o5S1bLR1Z6g5+n9w93y9uzALwOKwJj88fYSjxpT2u4bjk1+IuGHo8ehueyS
fXN5P21cRcwgELSIRTllRomnYhOI9QYV8KNpOAqyJr1bA0neL8fFLN3r5bW6
dg/j0whdhrAUmWNB23XDwRCRhGBVLUEr0ixHb0xVoEIoycpNs+5QHYF3hNix
JuJqCv7zwUH509ofFk6dSRbfb800e7pjrGQFSAnQpI8lb5aiIR7wThEOpK6k
52wiUYGr/dSMEKdBkoKfNDmXh+QMwrWuv9cHjG2YIGAvwhtu7QwYq3OF3i/o
XUlQF2+RA/nnyDUYNdpLwqNjYRvU2OqkCRMRbRl7UJpbbeRQIjU1dEzE8KQP
I7XTFD7lhIgljtwLGFwWAG8dcD5XaGKTdD7tglpJALz0SPi3SO2IzqR5MMTo
F59eqJUcHCiCdOx1Ej8Avt2qit2iBKG56cBnNIQnBSTh4GnZa5l79qi+w7qa
KojT5ZkqK71OXas7QBT7Rd2kJjwdIVIBLX0DagDcwqQFK5AkRK/5cfHj4g3J
k5IC9X7OZt/YluUuO49igFs4b2J7nKNJrhlTSpnq+6ZJIDgGXIZllE5jP3eE
trTINXPOEK0cLxKgUjawKwy17VE3nWnbNZM+4S2yI0UWgiUsEp5TgRTERngO
hb6WIXjULJkk6yRugaWzbNkU3tkiomOir6YlyLzcYjNfcsMCWaiPGoHcAwqA
GTgSiUA6YUhEhmSYR3w9cXgx/Rg8ABXDIK6xakVMd6Jp1IpZqrvC0L7gQ1Bx
Exg44ijhX657KSRI6PknQ7Z3L18vXv0rNSYaBFrp40VxtTSRIW2RWCAOQzNW
jrqm6AURIiQCJKp5BgBObSZOrF4C+9rELkksnoYdkO4o80RIOWe0CZlEauiw
oc/ZUxO8i/CTggw1cVJAYJjUaIkJGWhCsKwlxNDACSFmSLS73W4RF9C0GM5j
eMBpiuMzxDJmVIxI94aWUIENtwMXPBoY2Ec+EgHo3LsQe5k/vVQcIKVg/ado
W5jj6BIOektp7KIeIX8AM0hNr6htMg6IuNDKpnTCLHnCdIB1cCqAkBWBSBj2
ksFbQ5Vayc3uDhU6M7G1ID3aI/WQi9p2JI+t1SqJKssi3YTVEnLgpg9paceQ
c9BVnnOLx9FcpUpmZmJrdb7S9Jo3a2lbW7YvAeNZtkzwisaMM6jw+9NGKqBa
Mifu3WWHiCjGa0dhip3GxVMNteoyEWswVTlPvdiCTBaO1kkVNR/boZP6mGcG
4lSZ9FSHlr+lPovmiDunCjORw4g2wodYKFiZhbG9c4xMLcUdDXt4/jAEjyTK
MAmcCThpnso0CN9K2iVJDUOflvAWrRkn+SydhKArW0p9q3YyZpLYNkFp00Ch
UyimzjAJmLst/fO/Sep4FiWEjS07qSIznqvYcj9p89PsU8wL1ZxOmwl/8RAu
QAWz2C6zqYE86R6DHwY5xK3tSNHqVPrPJUemhgdQHifBH+iRdHelRqY3qQbM
MhlyvP7pTRyDSPXOEy1CcVwoT2v1cmyExEyhA+FFU2SDhKbwa9IVPZ1OeuGZ
3KIYODpjxxWzTb4WdW+3dKmE69WYVIYh40QnMeXSNJr7s5D5kXZGZ31Y/n4z
KQ0ECn+4+vDAv1yqD9bDl68cjTjk84OUdQ9cyQzdtN9pGimA4aYmAUv5TUL6
6KRXsYziObiKYiZVQj5FWZkm8FzaaS+FLizQfJHGW2y65FFT4+O2IEDB9cHY
eVIPNjySLI/ZjtkYKsBp5E2MXU9vJvB49tU7rBjYrVS6ZACo9th0eKzHlVug
upU6hKm1ubLcUk0nEk7r25gtY1l7Rt3yOIQ7vpoztNu42ztguzClS+YFlKa4
1THJvRFLgaR4OeC5pqw0i1hHQ/suJUYBfISGpDuSLmqMASimJlZ+FGpE48n9
ozNLjiPcTTMqPkU8+7hPOXEznjFKzX7Q31wciWUHuneesltDS7BRS7feJDP8
p+fGB0cLsdTiG5cdWAap2MM+E8gTp0GMBTgzp4Yd104+YgWWSWUfDTVmHA/r
9spUwezExsbihV9lj2Lz5J7PtNIeUjCD7bb3NEQIMc5J34+6HVCxNAVYbNLG
pYACMoZxMYPGoW8/jj2rWDvKZYiDyZBUOAfv6K+uT8SaZUxLsd0XA1UafI6G
OkwJqQah6fJsREv08tobvqA3tBWGlPlcE3voN61oLsg4sRKlWF8wipRxQqTK
Ti6DEHkeLuhqngBNbh4chflYz3OMp63ZviNjc9OAL8b7pYtXZMbcxPrjS0ix
foPhrYb+jkQJ4S8Yw+M2bP6noxnhqAYnOQ5pxuU2jhmctGFTnojI2qKg5N50
YksPox12N+QiyxcHuRH2/Uo/yPgOgSiv+nAYhfimjmUsBGughBY9MPYpIolf
X96RJnvFWAwLDnp9zxMhPUYCpdU8ojKSHaOM2F0FkOXh83Tad2yo0zo0hrV4
zyp1jCkWoxjiC7VMPgMyFxtTYKGedGdGAHo4gDgcvB9dgBgcmwE2X32I7WVp
4Iy3u2TIMGmJTPBHwiRFKgRlXidtzmEORFdv8fI03k94Hec/kwsMPOth2XFJ
4dI8YiyRYbIoj1AapUIdu6EQTrZd9qRtIf4DRM0XcmIDJN7dGpsSKXXsTIUq
lDtlsLYHg/rgmaupkzsJjSM/95p6GrL2a/DbTae0svPN8nb5zK7TaS6lPezO
KzVHCO5/q2WeSjZuH2V/XcrValP870njTp4EPMkt2FipUfAXQKubRxHOMOVs
jWtjr1sGsl2QvnSRxfa8TGASH+Rsl9lHh7Lp/xxYgHd0dqY+aWjqAbXcRnT4
D00g/w/nij28MN6CIxVk/w+elwbSkC4AAA==

-->

</rfc>
